Permanent Vulnerability Management Jobs

26 to 50 of 276 Permanent Vulnerability Management Jobs

Senior Threat Intelligence Analyst

London, Broad Street, United Kingdom
Advania UK
operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. more »
Employment Type: Permanent
Posted:

Lead Vulnerability Analyst

Ashburn, Virginia, United States
Leidos
be leading 5 to 10 VAT members, perform research on current threats and vulnerabilities, will be responsible for authoring security advisories and manage enterprise vulnerability compliance and will conduct vulnerability assessments of IT systems. The VAT Lead will be assisting the government with the Enterprise Information System Vulnerability Management (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support Incident Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: BS degree Science, Technology, Engineering, Math or … experience may be considered in lieu of a degree. Relevant experience is within one of the following areas pentesting, security technical assessments or supporting vulnerability scanning/management program. Experience managing teams Experience with vulnerability analysis Ability to identify false positives within scan results and work with more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Analyst

Salford, England, United Kingdom
ShortList Recruitment Limited
Analyst will oversee risk assessment and communication related to infrastructure vulnerabilities. They will collaborate with teams to identify vulnerabilities, prioritise risks, and improve the vulnerability management process. The right candidate for the Cyber Security Analyst position will have the following: Enjoy working in a fast-paced, customer-centric … colleagues, and a genuine interest in Cyber Security are key Have experience in similar roles, Cyber Security qualifications, and a track record of enhancing Vulnerability Management processes through communication and relationship-building The required skills for the Cyber Security Analyst include but are not limited to: A comprehensive … grasp of security vulnerabilities, their categorization, remediation methods, and associated risks is imperative Proficiency in prioritising vulnerability remediation based on threat intelligence and business context is crucial Strong skills in generating meaningful reports and communicating effectively with relevant stakeholders are a must Familiarity with security tools Proficiency in using more »
Posted:

Information System Security Officer - Industrial Control Systems

Piketon, Ohio, United States
Leidos
to ensure staff are aware of their responsibilities and can act in a manner that minimizes risk to the organization. Regularly report to senior management about the status of the organization's security posture, regulatory compliance status, audit findings, and any other security-related issues and plans. Regularly review … in the decision-making process to obtain needed information, make the most appropriate decisions, and ensure buy-in and understanding of resulting decisions. Task Management Skills: The candidate is expected to proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, and … Publication (SP) 800-53, Revision 4 or Revision 5 Demonstrated success in achieving project completion in a timely manner. This includes having effective project management skills and correctly assessing the time required to carry out given tasks. Experience using Cyber Security relevant tools, systems, and applications to include but more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Lead

Oxford, Oxfordshire, United Kingdom
Hybrid / WFH Options
Planet Recruitment
installation and configuration of hardware, applications, and software as part of Privacy by Design and Default. Manage and coordinate operational components of security incident management, including detection response and reporting. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans … and audit requirements. Review, escalate and action any unusual event behaviour identified through the groups information security systems. Create standards in system hardening, change management, documentation. Perform periodic firewall Ensure disaster recovery and data restoration processes work. Ensure appropriate Corrective and Preventative Actions are implemented in line with best … in broad domains of IT infrastructure such as data networks, server and desktop hardware and operating systems, storage and backups, and related monitoring and management systems. Demonstrable experience of applying security controls in one or more of the following areas: Unix/Linux Servers, Windows servers, firewalls, IDS/ more »
Employment Type: Permanent
Salary: £45000 - £59000/annum
Posted:

🌳🌳🌳X8 Cyber Security Consultants Needed – URGENT – – Interviews Available This Week and Next – Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Areti Group
ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity management and planning in place for the security services and solutions assigned to you and ensure that the solution is incorporated into the 18-month … technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue management and the budgeting process. Candidates should demonstrate: Must have at least 3 years of experience working in Cyber Security within a technical field. Must have a … or difficult it will be to exploit these vulnerabilities. Must be well versed in the application of security policies and standards, governance, compliance, risk management and technical assurance practices. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the more »
Posted:

Senior SOC Analyst

London Area, United Kingdom
Hybrid / WFH Options
CLS Group
and services to ensure that CLS is equipped with appropriate industry best tools and solutions Operational Operate and maintain controls related to SIEM, DLP, Vulnerability Management, DLP, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all … help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber threats Operate and maintain IT Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, DLP, Endpoint Protection, etc. Participate in an on-call rotation to act as an escalation point for events requiring … collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical IT Security acumen Expert knowledge of Firewalls, TCP/IP, IPS, DLP, proxies, SIEM, & Endpoint Protection software Financial more »
Posted:

Senior Cyber Security Engineer

Teddington, London, United Kingdom
Matchtech
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as Vulnerability Management and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
Employment Type: Permanent
Salary: £50,000
Posted:

Head of Microsoft Security

London Area, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials more »
Posted:

Senior Security Engineer - Onsite - £100K

London Area, United Kingdom
Oliver Bernard
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerability management tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerability management, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
Posted:

SOC Engineer

Chippenham, Wiltshire, United Kingdom
CGI
configuring SIEM Required qualifications to be successful in this role Track record of moving from project into service delivery Elastic SIEM experience Vmware experience Vulnerability Management Tooling #LI-SB2 Together, as owners, lets turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and … and broaden your horizons. Come join our teamone of the largest IT and business consulting services firms in the world. Skills Security Operations Centre Vulnerability Management(IAVM) Reference (phone number removed more »
Employment Type: Permanent
Posted:

Security Assurance Manager

London Area, United Kingdom
La Fosse
assurance capabilities across various platforms and technologies. • Ensure that the IT estate complies with technical standards and the company policies to safeguard company assets. Management oversees directing the required remediation actions and countermeasures to lessen vulnerabilities and weaknesses that have been identified. • Create and enhance a regular penetration testing … programme for the red and purple teams that are in line with industry cyber threats and primary threat intelligence. • Create a Vulnerability Management procedure to guarantee that all security flaws and vulnerabilities that are known to exist are located, evaluated in context, given priority, and tracked for remediation … task requiring cross-partner cooperation at varying degrees of technical security proficiency. • In-depth knowledge and comprehension of operational excellence in programmes related to vulnerability management and cloud security posture management. • A working knowledge of compliance and regulatory frameworks, including GDPR, ISA/IEC 62443, ISO/IEC more »
Posted:

IT Asset Manager

Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Employment Type: Permanent
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
Proftech Talent
Manager We are recruiting for a Lead IT Security Manager on a permanent basis. The Lead IT Security Manager is responsible for the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. This role is … . Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability … Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks more »
Employment Type: Permanent
Salary: £40750 - £61100/annum
Posted:

System Administrator

Dublin, City of Dublin, Republic of Ireland
Hybrid / WFH Options
The Recruitment Company
network issue resolution Contribute to budget development Monitor spending Your Experience: Windows Server (Apply online only), Windows 10/11, Hyper-V, Active Directory Management, Group Policy Management, SCCM, SQL 2016+, Microsoft 365 and Azure platform administration and security, SharePoint, Endpoint Protection Technologies, Network Access Control (NAC) solutions … Backup methodology and management, Check Point firewall Excellent knowledge of and proven experience in best practice Information Security, e.g. Incident Response, Intrusion mgmt., Attack Monitoring, Network mgmt., Threat and Vulnerability Management, e.g. SIEM, XDR, Firewall, IPS, NAC, Server config controls Excellent knowledge of and proven experience in … netting, Firewalls, routing protocols, encryption standards Proficient in automation tools including PowerShell, Power Automate, Office apps Excellent knowledge of and proven experience in Data Management - including database technologies and methodologies around implementing data privacy and data encryption Proven experience in liaising with an array of external vendors Strong English more »
Employment Type: Permanent
Salary: £60000 - £65000/annum
Posted:

Senior Information Security Analyst

London
Hybrid / WFH Options
Nexus Jobs Limited
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Employment Type: Permanent
Salary: £70,000 - £85,000
Posted:

Information Technology Security Specialist

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) Vulnerability Management and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:

Vulnerability Analyst

Leeds, England, United Kingdom
Cynexa
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerability management across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
Posted:

Security Operations Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management … templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution due to changing priorities. … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/ more »
Posted:

Global IT Infrastructure Manager

London, England, United Kingdom
Hybrid / WFH Options
ITRS
with all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support … available and fit for purpose to meet our needs as we scale our business. As a Global IT Infrastructure Manager, you will: Provide line management for the Global infrastructure staff. Lead the strategy, scalability, innovation, and best practices for local and global infrastructure solutions with service improvement reviews and … infrastructure services delivered. Directly contribute to ITRS Group's goal for achieving and maintaining ISO 27001 accreditation across the group. Be responsible for Problem management and helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes Identity and Access Management (IAM) for more »
Posted:

Information Technology Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Intaso
and maintaining the integrity, confidentiality, and availability of our information systems. Your expertise in Microsoft technologies and experience with SIEM (Security Information and Event Management) tools will be instrumental in identifying and mitigating security threats proactively. Responsibilities: 1. Security Monitoring and Incident Response: - Utilize SIEM tools such as Microsoft … analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers more »
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Proactive Appointments Limited
someone with previous experience in a Cyber Security Engineer role where they have gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. Experience working with cloud hosting providers, managing application testing and working with system owners/developers to improve application … in complex cross-technology environments. Maintain accurate logs of security events and incidents. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards. Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure. Understanding of security operations and keen to learn. Strong communication skills and able to work collaboratively with IT and other stakeholders. more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Focus Resourcing Limited
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Excellent communication skills and able to work collaboratively with IT and other stakeholders more »
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Focus Resourcing Group
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Strong communication skills and able to work collaboratively with IT and other stakeholders more »
Employment Type: Permanent
Posted:
Vulnerability Management
10th Percentile
£39,800
25th Percentile
£50,000
Median
£65,000
75th Percentile
£82,500
90th Percentile
£97,350